Sciweavers

1381 search results - page 160 / 277
» Trusted Computing: Providing Security for Peer-to-Peer Netwo...
Sort
View
ACSAC
2005
IEEE
15 years 6 months ago
PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness
As evidenced by the proliferation of phishing attacks and keystroke loggers, we know that human beings are not wellequipped to make trust decisions about when to use their passwor...
Sara Sinclair, Sean W. Smith
SASN
2003
ACM
15 years 6 months ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
104
Voted
AIMS
2008
Springer
15 years 2 months ago
A Role-Based Infrastructure for the Management of Dynamic Communities
Abstract. This paper addresses the problem of specifying and establishing secure collaborations between autonomous entities that need to interact and depend on each other in order ...
Alberto E. Schaeffer Filho, Emil Lupu, Morris Slom...
POLICY
2005
Springer
15 years 6 months ago
Relationship-Driven Policy Engineering for Autonomic Organisations
Autonomic systems are needed to self-manage the increasing complexity of pervasive communications access and the ubiquitous computing services it offers to humans. Policy based go...
Kevin Feeney, Karl Quinn, David Lewis, Declan O'Su...
ICCS
2003
Springer
15 years 6 months ago
visPerf: Monitoring Tool for Grid Computing
This paper describes a monitoring tool for grid computing[5], called visPerf. It is difficult to see the status of a working production grid system without a customized monitorin...
DongWoo Lee, Jack Dongarra, Rudrapatna S. Ramakris...